7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.7 High
AI Score
Confidence
High
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
23.3%
05/12/2022
High
Elevation of privilege vulnerability was found in Microsoft Windows. Malicious users can exploit this vulnerability to gain privileges.
Windows 10 Version 20H2 for ARM64-based Systems
Windows Server 2019 (Server Core installation)
Windows 10 Version 20H2 for x64-based Systems
Windows 10 Version 1809 for 32-bit Systems
Windows 8.1 for 32-bit systems
Windows 10 Version 21H1 for 32-bit Systems
Windows 10 Version 1909 for x64-based Systems
Windows 10 Version 1809 for x64-based Systems
Windows Server 2012 R2
Windows 10 Version 1909 for ARM64-based Systems
Windows Server, version 20H2 (Server Core Installation)
Windows Server 2016
Windows Server 2019
Windows 10 Version 21H2 for 32-bit Systems
Windows Server 2012 (Server Core installation)
Windows 10 for x64-based Systems
Windows Server 2016 (Server Core installation)
Windows 10 Version 1909 for 32-bit Systems
Windows 10 Version 21H1 for ARM64-based Systems
Windows RT 8.1
Windows Server 2022
Windows 10 Version 21H1 for x64-based Systems
Windows 10 Version 21H2 for ARM64-based Systems
Windows 10 Version 1607 for 32-bit Systems
Windows Server 2022 (Server Core installation)
Windows 11 for ARM64-based Systems
Windows 11 for x64-based Systems
Windows 10 for 32-bit Systems
Windows Server 2012
Windows 10 Version 21H2 for x64-based Systems
Windows 10 Version 1809 for ARM64-based Systems
Windows 8.1 for x64-based systems
Windows 10 Version 1607 for x64-based Systems
Windows Server 2012 R2 (Server Core installation)
Windows 10 Version 20H2 for 32-bit Systems
Install necessary updates from the KB section, that are listed in your Windows Update (Windows Update usually can be accessed from the Control Panel)
PE
CVE-2022-301387.2High
5014001
5013942
5013941
5014025
5013952
5013943
5013944
5014011
5013945
5013963
support.microsoft.com/kb/5013941
support.microsoft.com/kb/5013942
support.microsoft.com/kb/5013943
support.microsoft.com/kb/5013944
support.microsoft.com/kb/5013945
support.microsoft.com/kb/5013952
support.microsoft.com/kb/5013963
support.microsoft.com/kb/5014001
support.microsoft.com/kb/5014011
support.microsoft.com/kb/5014025
cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-30138
msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30138
portal.msrc.microsoft.com/en-us/security-guidance
statistics.securelist.com/vulnerability-scan/month
threats.kaspersky.com/en/product/Microsoft-Windows-10/
threats.kaspersky.com/en/product/Microsoft-Windows-8/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2012/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2016/
threats.kaspersky.com/en/product/Microsoft-Windows-Server-2019/
threats.kaspersky.com/en/product/Microsoft-Windows-Server/
threats.kaspersky.com/en/product/Microsoft-Windows/
threats.kaspersky.com/en/product/Windows-RT/
7.8 High
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
8.7 High
AI Score
Confidence
High
7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
23.3%